Discovered: Jun 9, 2021 - UTC 14:56
Resolved: Jun 10, 2021 - UTC 23:00
Auvik released a collector update in order to move to a newer version of OpenSSL 1.1.1, which caused the SNMP library to be updated. Cisco devices use a special version of SNMPv3 which broke while updating the library. Effect The Auvik Collector no longer could authenticate against Cisco equipment that was set up to communicate using the SNMPv3 Protocol with AES-265 encryption credentials. This disabled the monitoring of Cisco devices.
06/05/2021 1:00 UTC - Collector release version 2021-W22 was deployed to all Auvik
clusters.
06/09/2021 14:56 UTC - The ticket was submitted to the engineering team. It looked like SNMPv3 credentials with privacy protocol AES-256 stopped working after the 2021-W22 release.
06/09/2021 15:00 UTC - Auvik engineering team begins investigation into communication issues between collector and Cisco devices using SNMPv3 credentials with AES-265 encryption.
06/10/2021 03:30 UTC - Auvik rolls back changes to re-establish communication with Cisco devices using SNMPv3 AES-265 authentication.
06/10/2021 11:00 UTC - The inspection of data following the rollback indicated that not all SNMPv3 AES-256 devices were gathering data.
06/10/2021 15:00 UTC Investigation into the issue revealed that stale data was cached within the Auvik system and authentication could not succeed against Cisco SNMPv3 AES-256 devices.
06/10/2021 18:00 UTC - Auvik develops a script to flush out stale credentials from rolled back collectors to re-establish the communication.
06/10/2021 23:00 UTC - Auvik engineering team cleans up the stale data from SNMP credentials to resolve remaining issues with communication.